Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jakarta

Region: Jakarta Raya

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.52.217.157 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 100
2020-10-14 00:18:26
103.52.217.157 attackbotsspam
ET CINS Active Threat Intelligence Poor Reputation IP group 100
2020-10-13 15:30:30
103.52.217.157 attackspambots
IP 103.52.217.157 attacked honeypot on port: 1212 at 10/12/2020 1:46:16 PM
2020-10-13 08:06:21
103.52.216.216 attack
TCP ports : 139 / 8388
2020-10-04 09:02:51
103.52.216.216 attackspambots
TCP ports : 139 / 8388
2020-10-04 01:38:16
103.52.216.216 attackbots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-03 17:24:01
103.52.216.40 attackspambots
Automatic report - Banned IP Access
2020-09-29 00:23:35
103.52.216.40 attack
20000/tcp 137/udp 32773/udp...
[2020-08-25/09-27]5pkt,3pt.(tcp),2pt.(udp)
2020-09-28 16:25:28
103.52.217.227 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 98 - port: 10443 proto: tcp cat: Misc Attackbytes: 60
2020-07-30 22:13:35
103.52.217.65 attackspam
Jul 25 15:52:29 debian-2gb-nbg1-2 kernel: \[17943664.226040\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=103.52.217.65 DST=195.201.40.59 LEN=68 TOS=0x08 PREC=0x00 TTL=232 ID=54321 PROTO=UDP SPT=47028 DPT=787 LEN=48
2020-07-25 23:00:20
103.52.217.89 attack
Unauthorized connection attempt detected from IP address 103.52.217.89 to port 9600
2020-07-22 18:18:16
103.52.216.52 attack
Unauthorized connection attempt detected from IP address 103.52.216.52 to port 79
2020-07-22 17:31:08
103.52.217.57 attackspambots
Honeypot attack, port: 135, PTR: PTR record not found
2020-07-22 15:06:31
103.52.217.65 attackspam
Unauthorized connection attempt detected from IP address 103.52.217.65 to port 873
2020-07-22 14:46:11
103.52.255.2 attack
1594732355 - 07/14/2020 15:12:35 Host: 103.52.255.2/103.52.255.2 Port: 445 TCP Blocked
2020-07-15 01:56:57
Whois info:
% [whois.apnic.net]
% Whois data copyright terms    http://www.apnic.net/db/dbcopyright.html

% Information related to '103.52.2.0 - 103.52.2.255'

% Abuse contact for '103.52.2.0 - 103.52.2.255' is 'abuse.alert@abhinawa.co.id'

inetnum:        103.52.2.0 - 103.52.2.255
netname:        IDNIC-ABHINAWA-ID
descr:          PT Abhinawa Sumberdaya Asia
descr:          Corporate / Direct Member IDNIC
descr:          Signature Park Grande Complex Unit R/GF/15.
descr:          Jl. MT Haryono Kav.20, Jakarta, 13630
admin-c:        SD1037-AP
tech-c:         SD1037-AP
country:        ID
mnt-by:         MAINT-ID-ABHINAWA
mnt-irt:        IRT-ABHINAWA-ID
mnt-routes:     MAINT-ID-ABHINAWA
status:         ASSIGNED NON-PORTABLE
last-modified:  2024-04-20T00:21:00Z
source:         APNIC

irt:            IRT-ABHINAWA-ID
address:        PT Abhinawa Sumberdaya Asia
address:        Signature Park Grande Complex Unit R/GF/15.
address:        Jl. MT Haryono Kav.20, Jakarta, 13630
e-mail:         abuse.alert@abhinawa.co.id
abuse-mailbox:  abuse.alert@abhinawa.co.id
admin-c:        SD1037-AP
tech-c:         SD1037-AP
auth:           # Filtered
mnt-by:         MAINT-ID-ABHINAWA
last-modified:  2025-09-04T04:38:38Z
source:         APNIC

person:         Syafenri Deputra
address:        Signature Park Grande Complex Unit R/GF/15
country:        ID
phone:          +628113731000
e-mail:         support@abhinawa.co.id
nic-hdl:        SD1037-AP
mnt-by:         MNT-APJII-ID
last-modified:  2020-12-28T05:39:47Z
source:         APNIC

% Information related to '103.52.2.0/24AS138077'

route:          103.52.2.0/24
descr:          Advertise via AS138077
origin:         AS138077
mnt-by:         MAINT-ID-ABHINAWA
last-modified:  2024-04-18T10:10:24Z
source:         APNIC

% Information related to '103.52.2.0 - 103.52.2.255'

inetnum:        103.52.2.0 - 103.52.2.255
netname:        IDNIC-ABHINAWA-ID
descr:          PT Abhinawa Sumberdaya Asia
descr:          Corporate / Direct Member IDNIC
descr:          Signature Park Grande Complex Unit R/GF/15.
descr:          Jl. MT Haryono Kav.20, Jakarta, 13630
admin-c:        SD1037-AP
tech-c:         SD1037-AP
country:        ID
mnt-by:         MAINT-ID-ABHINAWA
mnt-irt:        IRT-ABHINAWA-ID
mnt-routes:     MAINT-ID-ABHINAWA
status:         ASSIGNED NON-PORTABLE
last-modified:  2024-04-20T00:21:40Z
source:         IDNIC

irt:            IRT-ABHINAWA-ID
address:        PT Abhinawa Sumberdaya Asia
address:        Signature Park Grande Complex Unit R/GF/15
address:        Jl. MT Haryono Kav.20, Jakarta, 13630
e-mail:         abuse.alert@abhinawa.co.id
abuse-mailbox:  abuse.alert@abhinawa.co.id
admin-c:        SD1-AP
tech-c:         SD1-AP
auth:           # Filtered
mnt-by:         MAINT-ID-ABHINAWA
last-modified:  2020-12-28T06:04:21Z
source:         IDNIC

person:         Syafenri Deputra
address:        Menara Kadin Indonesia, H.R. Rasuna Said No.X-5 Street,  20th Floor. Kuningan, Setiabudi District, South Jakarta
country:        ID
phone:          +62811808896
e-mail:         syafenri.deputra@abhinawa.co.id
nic-hdl:        SD1037-AP
mnt-by:         MAINT-ID-ABHINAWA
last-modified:  2023-10-02T03:16:51Z
source:         IDNIC

% Information related to '103.52.2.0/24AS138077'

route:          103.52.2.0/24
descr:          Advertise via AS138077
origin:         AS138077
mnt-by:         MNT-APJII-ID
last-modified:  2024-04-18T10:04:51Z
source:         IDNIC

% This query was served by the APNIC Whois Service version 1.88.34 (WHOIS-AU4)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.52.2.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37267
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.52.2.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025092800 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 28 16:03:12 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 149.2.52.103.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 103.52.2.149.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
192.144.184.92 attack
Mar 18 12:05:48 amit sshd\[18253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.184.92  user=root
Mar 18 12:05:50 amit sshd\[18253\]: Failed password for root from 192.144.184.92 port 46176 ssh2
Mar 18 12:14:50 amit sshd\[18425\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.184.92  user=root
...
2020-03-18 20:26:39
203.195.150.227 attackbots
Mar 18 12:54:00 v22019038103785759 sshd\[31108\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.150.227  user=root
Mar 18 12:54:02 v22019038103785759 sshd\[31108\]: Failed password for root from 203.195.150.227 port 38336 ssh2
Mar 18 12:56:52 v22019038103785759 sshd\[31269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.150.227  user=root
Mar 18 12:56:55 v22019038103785759 sshd\[31269\]: Failed password for root from 203.195.150.227 port 40636 ssh2
Mar 18 12:59:43 v22019038103785759 sshd\[31454\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.150.227  user=root
...
2020-03-18 20:17:50
188.254.0.170 attackspambots
Tried sshing with brute force.
2020-03-18 20:13:21
188.121.0.52 attack
port scan and connect, tcp 80 (http)
2020-03-18 20:09:55
118.32.131.214 attackspam
Feb 12 00:28:56 pi sshd[7108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.32.131.214 
Feb 12 00:28:58 pi sshd[7108]: Failed password for invalid user pantera from 118.32.131.214 port 54680 ssh2
2020-03-18 19:57:07
209.132.252.16 attackspam
injection sql
2020-03-18 20:02:15
167.114.251.107 attackspambots
Mar 18 12:48:08 ns382633 sshd\[1168\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.251.107  user=root
Mar 18 12:48:10 ns382633 sshd\[1168\]: Failed password for root from 167.114.251.107 port 53428 ssh2
Mar 18 12:52:05 ns382633 sshd\[1964\]: Invalid user ident from 167.114.251.107 port 57017
Mar 18 12:52:05 ns382633 sshd\[1964\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.251.107
Mar 18 12:52:07 ns382633 sshd\[1964\]: Failed password for invalid user ident from 167.114.251.107 port 57017 ssh2
2020-03-18 19:53:33
62.196.125.250 attackbotsspam
Unauthorized connection attempt from IP address 62.196.125.250 on Port 445(SMB)
2020-03-18 20:06:30
14.182.241.59 attack
Unauthorized connection attempt from IP address 14.182.241.59 on Port 445(SMB)
2020-03-18 20:26:10
113.190.72.91 attackbotsspam
Unauthorized connection attempt detected from IP address 113.190.72.91 to port 445
2020-03-18 19:40:37
68.183.19.84 attackspambots
Mar 18 12:45:01 host01 sshd[10116]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.19.84 
Mar 18 12:45:03 host01 sshd[10116]: Failed password for invalid user postgres from 68.183.19.84 port 35602 ssh2
Mar 18 12:49:09 host01 sshd[10704]: Failed password for root from 68.183.19.84 port 56176 ssh2
...
2020-03-18 19:59:17
106.75.67.48 attack
web-1 [ssh] SSH Attack
2020-03-18 19:49:44
122.54.141.234 attackspam
Unauthorized connection attempt from IP address 122.54.141.234 on Port 445(SMB)
2020-03-18 20:23:00
122.51.212.213 attackspambots
no
2020-03-18 20:31:40
118.163.49.39 attackbotsspam
Unauthorized connection attempt from IP address 118.163.49.39 on Port 445(SMB)
2020-03-18 20:03:19

Recently Reported IPs

10.20.28.153 110.40.186.63 77.232.152.225 216.180.246.96
14.103.70.72 59.62.114.124 27.47.85.64 223.90.52.182
209.38.77.224 195.96.129.16 193.32.126.214 176.65.149.218
170.106.187.106 117.65.140.240 204.0.18.208 45.149.173.225
27.189.130.146 223.150.100.180 183.162.114.70 111.226.157.138